排序方式: 共有67条查询结果,搜索用时 15 毫秒
61.
International concern over nuclear terrorism has grown during the past few decades. This has driven a broad spectrum of efforts to strengthen nuclear security globally, including the widespread adoption of radiation-detection technology for border monitoring. Detection systems are now deployed at strategic locations for the purported purpose of detecting and deterring the smuggling of nuclear and radioactive materials. However, despite considerable investment in this area, few studies have examined how these programs are implemented or the operational challenges they face on a day-to-day basis. This article seeks to address this with a focus on radiation-detection efforts at maritime facilities. Utilizing practitioner interviews and a survey, this article identifies the factors that influence the planning and use of these systems in this fast-moving environment. The results clearly demonstrate that the implementation of these systems varies significantly across different national and organizational contexts, resulting in a fragmented global nuclear-detection architecture, which arguably undermines efforts to detect trafficked nuclear-threat materials. Greater consideration should therefore be given to developing international standards and guidance, designing and adopting tools to support key parts of the alarm assessment process, and broader sharing of good practice. 相似文献
62.
Daniel Meier 《Small Wars & Insurgencies》2018,29(3):515-536
AbstractSince the end of the civil war in 1990, the Lebanese second Republic has experienced a dual security governance in the southern borderland region. Up to the Syrian military withdrawal in 2005, the territorial and functional ‘areas of limited statehood’ between the State and Hizbullah worked as a cooperation. After the Syrian withdrawal, various forms of cooperation appeared, raising the theoretical interest for the ‘mediated state’ framework. It is conceptualizing the cooperation between the state and the non-state actor as an interdependency – with case study ranging from the marking of the Blue Line to the struggle against the jihadists groups. 相似文献
63.
Daniel Alejandro Restrepo 《Journal of Military Ethics》2020,19(1):40-55
ABSTRACT Though it is legally permissible to kill combatants in war, unless they are rendered hors de combat, the existence of “Naked Soldiers” raises an important moral question: should combatants kill vulnerable enemy combatants or show mercy towards them? Most philosophers who address this question argue that it is morally permissible to kill the Naked Soldier given the extended notion of self-defense during war. They ground their arguments in a form of collectivism. In this article, I use Larry May’s argument. He offers an approach that extends the principle of discrimination that would apply also to combatants. Instead of assuming all combatants are de facto dangerous, this approach would allow for nuance in targeting the enemy and showing mercy when enemy combatants clearly pose no danger, in other words, when they are Naked Soldiers. I defend this view against two criticisms: Noam Zohar’s view of armies as complex collectives and Stephen Deakin’s view that a policy that spares Naked Soldiers would be open to abuse. I argue that it is not only morally suspect to kill Naked Soldiers, but also it is within the spirit of both international laws governing war and the just war tradition to offer mercy whenever possible. 相似文献
64.
65.
We address the capacitated lot‐sizing and scheduling problem with setup times, setup carry‐over, back‐orders, and parallel machines as it appears in a semiconductor assembly facility. The problem can be formulated as an extension of the capacitated lot‐sizing problem with linked lot‐sizes (CLSPL). We present a mixed integer (MIP) formulation of the problem and a new solution procedure. The solution procedure is based on a novel “aggregate model,” which uses integer instead of binary variables. The model is embedded in a period‐by‐period heuristic and is solved to optimality or near‐optimality in each iteration using standard procedures (CPLEX). A subsequent scheduling routine loads and sequences the products on the parallel machines. Six variants of the heuristic are presented and tested in an extensive computational study. © 2009 Wiley Periodicals, Inc. Naval Research Logistics 2009 相似文献
66.
Daniel Bultmann 《Civil Wars》2018,20(1):24-44
The article discusses the experiences of a group of military strongmen during the post-conflict transformation of two Cambodian insurgent movements into a society of peace after a decades-long civil war. It explains the reasons why some of these strongmen were able to transfer their high status within the insurgency into senior positions in the incumbent government, while others became impoverished and sometimes even preferred to relapse into further conflict. Even though all of these strongmen shared a very similar life course and fought until the end of the conflict, their post-conflict fates have been very different. Central to the explanation of their behaviour during the transition is their habitus, the set of resources at their disposal and the nature of their vertical and horizontal social networks. 相似文献
67.
Daniel Bultmann 《Small Wars & Insurgencies》2018,29(4):607-628
Current research on civil wars and conflict increasingly turns to the inner structure and functioning of state and non-state armed groups and their impact on aspects such as violent practice, internal cohesion and the dissolution of these groups during the conversion to peace. The first aim of this introduction is to set out the theme of this Special Issue on the social structure of armed groups and previous research within the field. The second aim is to introduce the contributions within the Special Issue, alongside possible trajectories of future research on the ‘meso-foundations’ of civil war and conflict. 相似文献